Terrorist Innovation: Homegrown Terrorism and the Internet, in John J

Total Page:16

File Type:pdf, Size:1020Kb

Terrorist Innovation: Homegrown Terrorism and the Internet, in John J Chapter 6 Terrorist Innovation: Homegrown Terrorism and the Internet Peter K. Forster 1 We face threats from homegrown terrorists – those who live in the communities they intend to attack and who are self-radicalizing, self-training, and self-executing. Robert Mueller III, Director FBI, January 20, 2010 Between September 11, 2001 and October 2009, the United States faced 32 “domestic” incidents of terrorism with thirteen of them occurring in 2009.2 At this point, it remains unclear whether 2009 represents an increasing trend or merely a spike in domestic incident. It is, however, clear that the threat of do- mestic terrorism is real. While these incidents share similarities, it is their dif- ferences that indicate multiple threats are emerging from multiple sources. Thus, it is important for the counter-terrorist professional to examine both the successful and failed attacks and understand the similarities and differences displayed by the adversary in each case. This can be a laborious process in- volving many variables. This paper seeks to launch the debate by narrowing the broader subject to one focusing on how terrorist groups innovate and more specifically, assessing how Internet-based communication is influencing the innovation process. The paper concludes that terrorist use of the Internet can be characterized as serving informational, operational, and knowledge transfer needs and that the competition for the communication battle space will con- tinue. Furthermore, it identifies some approaches to combating this effort. Terrorist use of the Internet is well developed in three relevant areas – re- cruitment, radicalization, and exploitation of events which includes not only the media coverage but the more subtle process of “peer review” that either encourage or dissuade others from using the tactic. If information transfer represents the first generation use of Internet, the second generation is knowl- edge transfer which encompasses the enhanced ease and value of the Internet’s 1 Dr. Forster is a professor at the Center for Network Centric Cognition and Informa- tion Fusion (NC2IF), College of Information Science & Technology (IST), Penn State University. 2 Bobby Ghosh, “Domestic-Terrorism Incidents Hit a Peak in 2009,” Time online, 23 De- cember 2009; www.time.com/time/nation/article/0,8599,1949329,00.html. 79 80 Peter K. Forster growing interactivity that facilitates tactical, operational, and strategic situ- ational awareness. The November 2008 Mumbai attacks epitomized the tactical use of interactive Internet-based technologies. The terrorists’ efficiency and effectiveness was enhanced through the gathering, fusion, and sharing of in- formation gathered from a variety of sources. Although in its infancy, knowl- edge transfer or learning via the Internet, as discreet from information trans- fer, is a strategic concern for those concerned with counter-terrorism. To approach this subject, it is important to understand the global context in which the integration of technology is occurring, to identify the role technology plays for terrorist groups and in the terrorism processes, and finally what this says about terrorism in the 21st century and how might it be combated. This study will limit its scope by using information from a variety of cases, primarily but not exclusively US domestic ones, to develop some assertions and possible counter-strategies. As a result of this methodology, it is not meant to be a com- prehensive study but one that offers some lessons learned and thus contributes to a broader understanding of a complex and dynamic issue. The study’s great- est contribution is to emphasize that terrorism is a dynamic issue and as a re- sult counter-terrorism also must be. Terrorists or terrorist groups continue to innovate, adapt, and redesign themselves in order to promulgate their objectives. As a result, innovation and learning evolving from what others have done, what has been successful, and what has been the response and reaction is critical. “Copy catting” in the ter- rorist world is an understood phenomenon and concern. At a more sophisti- cated level, innovation and learning by and among terrorist groups is neither new nor should it be ignored. Between 1997–2001, the IRA reportedly gener- ated between $ 20 – $ 30 million by providing training to the FARC, the PLO, and the ETA.3 The Iranian Revolutionary Guard Corps supplied new IED technology and training to Iraqi Shiites as recently as 2007.4 Today, a growing number of British and American Muslims are travelling to Afghanistan, Paki- stan, and Yemen to receive training from the bomb-makers, operational direc- tions from planners, and practical field experience by participating in in-thea- ter attacks. The increasing use of communication technologies has only served to increase inter-organizational and individual adaptation of successful meth- ods and innovation and promises to continue to be a key part of the terrorists’ strategy into the future. Global terrorism in 2010 is characterized by a convergence of need, interest, and means. These are being met by Internet communications that increase ac- cessibility and offer greater interactivity. Virtual communications have become the center of gravity for terrorism in the 21st century. The ultimate control and 3 Andy R. Oppenheimer, “IRA and Technology Transfer,” Presentation to RTI Interna- tional, Washington D.C., 13 March 2009. 4 Clay Wilson, Improvised Explosive Devices (IEDs) in Iraq and Afghanistan: Effects and Countermeasures, Report for Congress RS22330 (United States: Congressional Re- search Service, 28 August 2007). Homegrown Terrorism and the Internet 81 manipulation of this battle space is essential to implementing an effective counter-terrorism strategy. In order to develop and implement such a strategy it is important to understand how the Internet is being used by the jihadist, where are its weaknesses and strengths, and how might it be exploited as an instrument of change. Communication is the adhesive between the individual and the group and in increasingly geographically disbursed terrorist groups is critically important.5 US successes at disrupting the activities of “al Qaeda central” in the wake of 9/11 has resulted in an increased need for engaging or permitting “affiliated groups” to extend the battle space. Al Qaeda has made good use of virtual communications to promulgate its Salafist ideology and incite individuals and organized affiliated groups to action. Certainly the message has resonated with some closely linked al Qaeda allies such as the Pakistani Taliban who report- edly provided training to Faisal Shahzad. A more geographically disbursed in- dication of increased affiliate activity is a May 2010 recording by Abu Basir Al- Wahishi, a reported leader of al Qaeda in the Arabian Peninsula, in which he talks about AQAP’s commitment to attacking the US and Western interests.6 While affiliates seek to act, previously unconnected individuals and groups are coalescing to either perform specific tasks such as David Headley and Tahawur Hussain Rana conspiracy to attack a Danish newspaper or pursue mutual inter- ests such as the reported connections between Hezbollah and South American drug cartels. Third, the Internet has been successfully used to recruit and fur- ther radicalize the disenfranchised. Finally, it has enhanced the exploitation of events increasing the reputation of those who move to “violent radicalization” and enhancing the conviction of the self-radicalized, such as Nidal Hasan, to take violent action. Use of the Internet as a recruitment and radicalization venue is well docu- mented. Using well designed strategies to reach target markets including multi- lingual websites and blogs, terrorist groups continue to use the Internet to dis- seminate their message and seek new adherents. Young Muslims who feel dis- enfranchised from the Western society in which they live explore the Internet for information on extremism, find like-minded individuals, and build virtual groups of radicalized individuals.7 What has increased is the recruitment of westerners or those sufficiently familiar with western culture to reduce the scrutiny by local law enforcement. However, the vast majority of radicalized individuals do not convert their words to action. Those who do, such as Na- jibullah Zazi and Shahzad, have sought additional connections beyond those 5 John Horgan, Walking Away from Terrorism: Accounts of Disengagement from Radical and Extremist Movements (Political Violence) (New York: Routledge, June 2009). 6 Targeted Actionable Monitoring Center (TAMC), Institute of Terrorism Research and Response, 17 May 2010. 7 Mitchell D. Silber and Arvin Bhatt, Radicalization in the West: The Homegrown Threat (New York, NY: The New York City Police Department, Intelligence Division, 2007), p.8, www.nypdshield.org/public/SiteFiles/documents/NYPD_Report-Radicalization_ in_the_West.pdf. 82 Peter K. Forster offered by the Internet. The predominance of “violent radicalization” processes combines the Internet with some kind of face-to-face interaction and “training” usually outside of the target country. Additionally, a review of cases indicates an increasingly important role for a “spiritual adviser” who continues to act as a mentor to the terrorist once he or she has returned to the country of the at- tack. Anwar al-Awlaki, killed by a US drone, is well known for providing such a service to Hasan and Shahzad, but Zazi received similar support from the Imam in his Queen’s mosque. Apparently,
Recommended publications
  • Al Qaeda's Latest Bid to Woo India's Muslims
    17 October 2013 Al Qaeda’s Latest Bid to Woo India’s Muslims Al Qaeda has struggled in the past to gain the support of India’s vast Muslim population. But that’s gradually changing, warns Animesh Roul. Today, he outlines how the fragmented organization is trying to attract money and manpower from the third largest Muslim community on the planet. By Animesh Roul for ISN Al Qaeda has recently renewed its efforts to gain a foothold within India’s 176 million-strong Muslim community. In June 2013, Maulana Asim Umar, a senior Al Qaeda ideologue, released why there is no storm in your ocean, a video that calls on the country’s Muslims to join the global jihad. Two months later, Al Qaeda leader Ayman al-Zawahri issued specific guidelines for Jihad and Dawa that endorsed the right of militants to fight Indians in Kashmir. The messages were released against a backdrop of growing Islamist extremism in India spearheaded by the Indian Mujahideen (IM). Worse still, the captured leader of Indian Mujahideen (IM), recently revealed to interrogators his organization’s plans to join ranks with Al Qaeda for operations inside India. Al Qaeda’s India fixation Three pivotal issues make India a prime target for Al Qaeda: the country’s ties with the United States and Israel, the Kashmir question and New Delhi’s strategic interests in Afghanistan. In this respect, the organization began to ramp up its rhetoric against the country in 2006. In April of that year, al-Zawahiri released a video message praising Islamist activities in the disputed territories of Jammu and Kashmir.
    [Show full text]
  • Recent Patterns of Terrorism Prevention in the United Kingdom
    CORE Metadata, citation and similar papers at core.ac.uk Provided by Calhoun, Institutional Archive of the Naval Postgraduate School Calhoun: The NPS Institutional Archive Faculty and Researcher Publications Faculty and Researcher Publications 2008-01-00 Recent Patterns of Terrorism Prevention in the United Kingdom Irons, Larry R. Monterey, California. Naval Postgraduate School Homeland Security Affairs (January 2008), v.4 no.1 http://hdl.handle.net/10945/25108 Recent Patterns of Terrorism Prevention in the United Kingdom Larry R. Irons INTRODUCTION The Provisional Irish Republican Army (PIRA) was the basic internal security threat to the United Kingdom over the past 100 years. In particular, more than 3,600 people died during the “Troubles” (1969-1996). However, authorities no longer consider Irish paramilitary organizations the country’s major terrorist threat.1 The major terrorist challenge to the UK today comes from international terrorist groups affiliated with al Qaeda. Until recently, the nexus of the affiliation with al Qaeda was Pakistan and Afghanistan. Recent attacks suggest a nexus with Iraq as well. However, the emergence of a new threat such as al Qaeda does not mean that intelligence analysts’ thinking, conditioned to meet one threat, e.g. PIRA, adjusts readily to the new threat.2 The analysis here highlights this issue in the recent patterns of terrorism prevention in the UK. Three agencies make up the national intelligence and security services in the UK, The Secret Intelligence Service (MI6) – the nation’s external intelligence agency overseen by the foreign secretary; the Government Communications Headquarters (GCHQ) – which develops signals intelligence, also overseen by the foreign secretary; and the Security Service (MI5), which operates under the authority of the home secretary to conduct surveillance operations.
    [Show full text]
  • NCTC Annex of the Country Reports on Terrorism 2008
    Country Reports on Terrorism 2008 April 2009 ________________________________ United States Department of State Publication Office of the Coordinator for Counterterrorism Released April 2009 Page | 1 Country Reports on Terrorism 2008 is submitted in compliance with Title 22 of the United States Code, Section 2656f (the ―Act‖), which requires the Department of State to provide to Congress a full and complete annual report on terrorism for those countries and groups meeting the criteria of the Act. COUNTRY REPORTS ON TERRORISM 2008 Table of Contents Chapter 1. Strategic Assessment Chapter 2. Country Reports Africa Overview Trans-Sahara Counterterrorism Partnership The African Union Angola Botswana Burkina Faso Burundi Comoros Democratic Republic of the Congo Cote D‘Ivoire Djibouti Eritrea Ethiopia Ghana Kenya Liberia Madagascar Mali Mauritania Mauritius Namibia Nigeria Rwanda Senegal Somalia South Africa Tanzania Uganda Zambia Zimbabwe Page | 2 East Asia and Pacific Overview Australia Burma Cambodia China o Hong Kong o Macau Indonesia Japan Republic of Korea (South Korea) Democratic People‘s Republic of Korea (North Korea) Laos Malaysia Micronesia, Federated States of Mongolia New Zealand Papua New Guinea, Solomon Islands, or Vanaatu Philippines Singapore Taiwan Thailand Europe Overview Albania Armenia Austria Azerbaijan Belgium Bosnia and Herzegovina Bulgaria Croatia Cyprus Czech Republic Denmark Estonia Finland France Georgia Germany Greece Hungary Iceland Ireland Italy Kosovo Latvia Page | 3 Lithuania Macedonia Malta Moldova Montenegro
    [Show full text]
  • Social Networks: Social Networks
    14/03/2011 The latest issues surrounding catastrophe modelling Dr. Gordon Woo Social Networks: the key to understanding the frequency of catastrophe terrorism losses © 2010 The Actuarial Profession www.actuaries.org.uk Understanding Al Qaeda’s capabilities ‘After 9/11, the UK and other western countries were faced with the fact that the titthtdbAlQdterrorist threat posed by Al Qaeda was indiscriminate, global and massive. We have a better understanding of the nature and scope of Al Qaeda's capabilities but we did not have that understanding in the period immediately after 9/11’9/11 Jonathan Evans, Director-General MI5 Bristol University, October 15, 2009 1 1 14/03/2011 The Likelihood of Plot Interdiction ‘It is with deep regret that I informed the President today that I will step down as Director of National Intelligence effective Friday, May 28th.’ Dennis C. Blair ‘Fighting terrorism is like being a goalkeeper. You can make a hundred brilliant saves but the only shot that people remember is the one that gets past you.’ Prof. Paul Wilkinson Chairman, Centre for the Study of Terrorism and Political Violence, St. Andrews 2 IRA Campaign in Northern Ireland Four out of five attempted IRA attacks were interrupted by security forces. Chief Constable of Royal Ulster Constabulary; confirmed by Stell a Rim ing ton, Direc tor-GlfMI5General of MI5 A senior member of the provisional IRA stated that around nine out of ten operations were not carried out due to security force activities. 3 2 14/03/2011 Suicide Bomb Attacks in Israel Suicide bombing, Carmel market, Israel, November 1st, 2004 Security improved during the course of the Intifada.
    [Show full text]
  • Home-Grown Terrorism
    HOME-GROWN TERRORISM WHAT DOES IT MEAN FOR BUSINESS? ‘ THE CURRENT STRAIN OF ‘HOME GROWN’ TERRORIST PLOTS PRESENTS A PARTICULARLY MENACING AND CONSTANT THREAT’ HOME - GROWN TERRORISM WHAT DOES IT MEAN FOR Business? 3 Foreword 4 Executive summary 6 Measuring the home-grown terrorist threat 20 Assessing the impact on business 30 What can business do about the risk? 41 Conclusions 2 Home-grown terrorism What does it mean for business? FOREWoRD from the chairman of lloyd’s For over 300 years, the Lloyd’s insurance market has been Ultimately, we must recognise that home-grown terrorism helping business to prepare for and respond to uncertainty, represents a struggle to engage with a lost generation. Society but the 21st century has brought its own set of challenges. will therefore only conquer the threat if we start thinking and investing ‘long-term’, both at home and abroad. Our work this year in both the US and Europe has highlighted the emergence of a new brand of home-grown terrorism, probably For the business community, that means we must start to think the greatest security threat we now face. and behave as if we are part of the solution. There has therefore never been a greater need to share lessons and expertise with No-one should be in any doubt that home-grown terrorism has each other and within society more widely. the potential to disrupt business signifi cantly. However, although most business leaders are increasingly worried about it, they have also told us that they currently understand very little about what home-grown terrorism risk means for their business.
    [Show full text]
  • Home Grown Terrorism and Islamist Radicalisation in Europe
    Home grown terrorism and Islamist radi- calisation in Europe From conversion to terrorism An assessment of the factors influencing violent Islamist extremism and suggestions for counter radicalisation measures Det projekt, der beskrives i denne rapport, er støttet økonomisk af Justitsministeriets Forskningspulje. Projektets gennemførelse og resultater er alene forfatternes ansvar. De vurderinger og synspunkter, der fremsættes i rapporten, er forfatternes egne og deles ikke nødvendigvis af Justitsministeriet. Research report funded by the Danish Ministry of Justice (December 2007) By Tomas Precht Table of Contents ________________________________________________________________________________ Tables and figures 3 Foreword 4 Summary 5 1. Introduction 9 2. Research agenda and definitions 13 3. The threat from home grown terrorism 18 4. Home grown terrorism as a historical phenomenon 23 5. The roots of radical Islamist ideology 27 6. The radicalisation process – dynamics and catalysts 32 7. Motivational factors 38 8. Background factors 42 • Muslim identity crisis 42 • Experience of discrimination and relative deprivation factors 43 • Living environment and peers (segregation and parallel society) 45 • Relative lack of Muslim public debate on Islamist terrorism in Europe 46 9. Trigger factors 50 • Foreign policy and single provocative incidents 50 • The myth of Jihad and desire for activism 52 • Presence of a charismatic person or spiritual advisor 53 10. Opportunity factors 56 • The Internet 56 • Satellite channels 59 • Prisons 60 • The Mosque 63 • School, university, youth clubs or workplace and sporting activities 66 11. Advanced radicalisation: Overseas travel, training and planning 68 12. Prevention and counter radicalisation strategies 71 • Societal measures 73 • Counter ideology 74 • Policing and community intelligence 77 • Public diplomacy and foreign policy 79 13.
    [Show full text]
  • Ethno-Religious Conflict in Europe
    ETHNO-RELIGIOUS CONFLICT IN EUROPE TYPOLOGIES OF RADICALISATION IN EUROPE’S MUSLIM COMMUNITIES EDITED BY MICHAEL EMERSON AUTHORS OLIVIER ROY SAMIR AMGHAR THEODOROS KOUTROUBAS, WARD VLOEBERGHS & ZEYNEP YANASMAYAN TINKA VELDHUIS & EDWIN BAKKER RACHEL BRIGGS & JONATHAN BIRDWELL PATRICIA BEZUNARTEA, JOSÉ MANUEL LÓPEZ & LAURA TEDESCO ALEKSEI MALASHENKO & AKHMET YARLYKAPOV CENTRE FOR EUROPEAN POLICY STUDIES BRUSSELS The Centre for European Policy Studies (CEPS) is an independent policy research institute based in Brussels. Its mission is to produce sound analytical research leading to constructive solutions to the challenges facing Europe today. CEPS Paperbacks present analysis and views by leading experts on important questions in the arena of European public policy, written in a style geared to an informed but generalist readership. The views expressed in this report are those of the authors writing in a personal capacity and do not necessarily reflect those of CEPS or any other institution with which they are associated. This project has been funded by the European Union’s 6th Framework Programme. CEPS’s broader work programme on Islam-related issues is supported by grants from the Compagnia di San Paolo and the Open Society Institute, which are gratefully acknowledged. With grateful thanks to François Schnell for allowing us to use his photo on the cover, showing a burning car in Strasbourg torched during the 2005 riots. ISBN 978-92-9079-822-4 © Copyright 2009, Centre for European Policy Studies. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means – electronic, mechanical, photocopying, recording or otherwise – without the prior permission of the Centre for European Policy Studies.
    [Show full text]
  • Idss Commentaries
    RSIS COMMENTARIES (85/2007) RSIS Commentaries are intended to provide timely and, where appropriate, policy relevant background and analysis of contemporary developments. The views of the authors are their own and do not represent the official position of the S.Rajaratnam School of International Studies, NTU. These commentaries may be reproduced electronically or in print with prior permission from RSIS. Due recognition must be given to the author or authors and the S. Rajaratnam School of International Studies, Nanyang Technological University. For more information on this, please do not hesitate to email: [email protected] or call 6790 6982 to speak to the Editor of RSIS Commentaries. ___________________________________________________________________________________ India in the face of global jihad: Time to re-evaluate? Sujoyini Mandal* 7 August 2007 IS INDIA now on the map of global jihad? The arrests of two Indian Muslims, Sabeel Ahmed and Kafeel Ahmed, from the United Kingdom in connection with the failed London and Glasgow bombings on 29-30 June 2007, seem to suggest this. Both Indians are young, well educated established professionals, who represent India’s Muslim middle class. Significantly they belong to the state of Karnataka, where literacy among Muslims is higher than other parts of the country, and particularly from Bangalore, the cosmopolitan Information Technology (IT) hub of India. Kafeel Ahmed keenly followed events in Afghanistan and Palestine. Evidence gathered from his house includes speeches delivered by Osama Bin Laden, graphic videos of tortured Chechen terrorists and online manuals on how to prepare bombs. This is the first time that Indian professionals working abroad are being directly linked to a terrorist attack overseas.
    [Show full text]
  • Radical Islam on UK Campuses
    RADICAL ISLAM ON UK CAMPUSES A Comprehensive List of Extremist Speakers at UK Universities RADICAL ISLAM ON UK CAMPUSES A Comprehensive List of Extremist Speakers at UK Universities The Centre for Social Cohesion 2010 The Centre for Social Cohesion Clutha House, 10 Storey’s Gate London SW1P 3AY Tel: +44 (0)20 7222 8909 Fax: +44 (0)5 601527476 Email: [email protected] www.socialcohesion.co.uk The Centre for Social Cohesion Limited by guarantee Registered in England and Wales: No. 06609071 © The Centre for Social Cohesion April 2010 All the Centre’s publications seek to further its objective of promoting human rights for the benefit of the public. The views expressed are those of the author, not of the Centre. Radical Islam on UK campuses ISBN 978-0-9560013-7-5 All rights reserved Contents Preface v Introduction vii Radicalisation on campus 1 ISOC presidents and members involved in terrorism in the UK 1 Students at British universities convicted of Islamism-inspired terrorist offences 2 Other cases involving radicalisation at UK universities 4 Radical preachers on UK campuses 7 University College London 7 Queen Mary University 16 City University 19 School of Oriental and African Studies 22 King’s College London 25 University of East London 25 London School of Economics 26 Imperial College London 26 Goldsmiths 27 University of Westminster 27 Kingston University London 27 London South Bank University 28 Northumbria University 28 University of Birmingham 28 Federation of Student Islamic Societies 29 Muslim opinion on campus 31 Islam on Campus – Centre for Social Cohesion/YouGov survey, 2008 31 Effects of active Islamic-Society membership on attitudes towards key issues 32 Reactions to the report 35 Preface For many years it has been clear that British university campuses are breeding grounds of Islamic extremism.
    [Show full text]
  • Exploring Patterns of Behaviour in Violent Jihadist Terrorists an Analysis of Six Significant Terrorist Conspiracies in the UK
    CHILDREN AND FAMILIES The RAND Corporation is a nonprofit institution that helps improve policy and EDUCATION AND THE ARTS decisionmaking through research and analysis. ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE This electronic document was made available from www.rand.org as a public INFRASTRUCTURE AND service of the RAND Corporation. TRANSPORTATION INTERNATIONAL AFFAIRS LAW AND BUSINESS NATIONAL SECURITY Skip all front matter: Jump to Page 16 POPULATION AND AGING PUBLIC SAFETY SCIENCE AND TECHNOLOGY Support RAND TERRORISM AND Browse Reports & Bookstore HOMELAND SECURITY Make a charitable contribution For More Information Visit RAND at www.rand.org Explore RAND Europe View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND electronic documents to a non-RAND Web site is prohibited. RAND electronic documents are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation technical report series. Reports may include research findings on a specific topic that is limited in scope; present discussions of the methodology employed in research; provide literature reviews, survey instru- ments, modeling exercises, guidelines for practitioners and research professionals, and supporting documentation; or deliver preliminary findings. All RAND reports un- dergo rigorous peer review to ensure that they meet high standards for research quality and objectivity.
    [Show full text]
  • The Case of Dr Mohamed Haneef: an Australian 'Terrorism Drama' with British Connections
    University of Wollongong Research Online Sydney Business School - Papers Faculty of Business and Law 2009 The Case of Dr Mohamed Haneef: An Australian 'Terrorism Drama' with British Connections Mark Rix University of Wollongong, [email protected] Follow this and additional works at: https://ro.uow.edu.au/gsbpapers Part of the Business Commons Recommended Citation Rix, Mark: The Case of Dr Mohamed Haneef: An Australian 'Terrorism Drama' with British Connections 2009. https://ro.uow.edu.au/gsbpapers/34 Research Online is the open access institutional repository for the University of Wollongong. For further information contact the UOW Library: [email protected] The Case of Dr Mohamed Haneef: An Australian 'Terrorism Drama' with British Connections Abstract This article examines the treatment of Dr Mohamed Haneef, an Indian doctor arrested under Australia‟s anti-terrorism legislation in July 2007 as Australian authorities including the Australian Federal Police, Commonwealth Director of Public Prosecutions, Australian Security Intelligence Organisation, (wrongfully) believed that he was linked to the terrorist attack at Glasgow airport in June 2007. The actions and responses of these two agencies, and the subsequent judicial inquiry are reviewed in the light of the media‟s role and press coverage as the case unfolded. Disciplines Business Publication Details Rix, M., The Case of Dr Mohamed Haneef: An Australian 'Terrorism Drama' with British Connections, Plymouth Law Review, 2, Autumn, 2009. A version of this paper was also published under the title 'The Show Must Go On: The Drama of Dr Mohamed Haneef and the Theatre of Counter-Terrorism', in Nicola McGarrity, Andrew Lynch and George Williams (eds), Counter-Terrorism and Beyond: The Culture of Law and Justice after 9/11, Routledge, Abingdon Oxon, 2010, 199-216.
    [Show full text]
  • Engineers of Jihad: the Curious Connection Between Violent
    © Copyright, Princeton University Press. No part of this book may be distributed, posted, or reproduced in any form by digital or mechanical means without prior written permission of the publisher. 1 The Education of Islamist Extremists On Christmas Day 2009, Umar Farouk Abdulmutallab, a twenty- three- year- old Nigerian man, arrived from Ghana into Amsterdam’s Schiphol airport where he boarded Northwest Airlines Flight 253 to De- troit. As the airplane approached its destination, Abdulmutallab disap- peared for twenty minutes into the lavatory. Back in his seat, he started fumbling around with his underwear. Neighboring passengers saw his trousers on fire and Jasper Schuringa, a Dutch film director, jumped on Abdulmutallab and subdued him, while flight attendants rushed to the scene with a fire extinguisher. The explosive device he had hidden in his pants failed to detonate and Abdulmutallab was arrested. Authorities dis- covered that he had been in contact with Al-Qaida elements in Yemen. Just a year earlier Abdulmutallab had received a degree in mechanical engineering from University College London.1 Two months before Abdulmutallab’s attempt, on 13 October 2009, Mohamed Game, a thirty- seven- year- old Libyan living in Italy, blew him- self up with two kilos of nitrate at the entrance of the Caserma Santa Barbara, an army barracks in Milan. This was the first and thus far only suicide attack attempted in Italy, and Game might have been a “lone wolf” operator, at most a member of a small local network. Game— who lost his right hand in the attack and is now serving a fourteen- year sentence— has a degree in electronic engineering.
    [Show full text]